RSS
Логотип
Баннер в шапке 1
Баннер в шапке 2

Chord-MCT Trusted Download Software Module

Product
Developers: OKB SAPR
Last Release Date: 2022/07/05
Technology: Information Security - Information Security,  Authentication - Information Leakage Prevention

Content

White Paper: DLP - Data Loss/Leak Prevention

The Chord-MKT trusted loading module is a trusted loading tool (SDZ) for microcomputers compatible with the Harvard architecture, characterized, among other things, by the placement of a standard operating system in the memory module.

2022: JaCarta Electronic Key Compatibility

On July 5, 2022, Aladdin R.D. announced that it had officially confirmed the compatibility of its products with OKB SAPR.

Based on the test results, the companies issued a certificate of compatibility of JaCarta electronic keys from Aladdin R.D. and a trusted loading module (MDZ) Accord-MKT developed by OKB SAPR. The joint use of Accord-MKT and JaCarta tokens will create an additional "frontier" of protection for computers and microcomputers, strengthening user authentication through a cryptographic key.

The use two-factor authentication of computer technology for users with Accord-MKT "on board" will be able to improve the security of any infrastructure, be it (critical information infrastructure CII) or other corporate or state information systems. CUES Elements include, for example, information systems used to control the movement of passenger trains, airports, components in ASU enterprises fuel and energy complex and other strategically important areas for the state, for example, in,, and. to power mining metallurgical chemical industry

The correctness of sharing has been proven for USB-tokens smart cards and for strict two-factor user authentication and operation with enhanced (electronically signed EP) JaCarta, PKI/GOST PKI JaCarta-2 and USB token for storing key CIPF JaCarta LT software containers.

According to the results of the tests, Aladdin R.D. and OKB SAPR expressed mutual intention to further cooperate in the field of product compatibility. The possibility of sharing the developments of two representatives in the field of information security will allow Russian clients to choose the optimal solutions for objects and information systems with the most stringent security requirements.

2021

Integration with Aerodisk Engine DSS

Aerodisk and OKB SAPR have completed the next project of technical integration of their products - the Aerodisk Engine line of data storage systems and the Accord MKT and Accord X K trusted download solutions. Aerodisk announced this on September 29, 2021. Read more here.

Capabilities of MDZ "Accord-MKT"

MDZ "Accord-MKT" is a software product (special software, special software) intended for embedding microcomputers and computers based on processors with x86_64 architecture (hereinafter referred to as a microcomputer or MCT) into the basic I/O system (AEMS) and ensuring the implementation of the main functions of its protection against NSD, including setting up, monitoring the functioning and control of protective mechanisms.

Embedding (firmware) of the "Accord-MKT" special software in the IASB is carried out by the manufacturer of the product at the stage of manufacturing the MKT, that is, "Accord-MKT" is purchased as part of a microcomputer.

Opportunities

According to the information for September 2021, MDZ "Accord-MKT" provides:

  • identifying and authenticating users upon login by a unique user ID and a time-validity password of 0 to 12 alphanumeric characters entered from the keyboard;
  • identification and authentication of users when admitting to the "Accord-MKT" MDC configuration and administration tools by unique user ID and password 0 to 12 alphanumeric characters entered from the keyboard;
  • monitoring of integrity of individual MKT files and software;
  • administration, including:
    • registration of users and their identifiers;
    • construction of lists of objects for integrity control and indication of monitoring modes;
    • working with the log of system events and user actions;
    • the ability to back up to an alienated medium and restore the user database and the list of monitored objects;

  • registration and accounting of system events and user actions;
  • protection against malicious code.